DADABox / revisiting-iot-device-identificationLinks
Data and code for TMA 2021 paper "Revisiting IoT Device Identification"
☆7Updated 2 years ago
Alternatives and similar repositories for revisiting-iot-device-identification
Users that are interested in revisiting-iot-device-identification are comparing it to the libraries listed below
Sorting:
- Detection of IoT devices infected by malwares from their network communications, using federated machine learning☆40Updated last year
- ☆27Updated last year
- SDN based system to translate MUD profile to flow rules using Faucet as a controller☆10Updated 6 years ago
- Contact: Alexander Hartl, Maximilian Bachl, Fares Meghdouri. Explainability methods and Adversarial Robustness metrics for RNNs for Intru…☆19Updated 4 years ago
- cool project☆19Updated 4 years ago
- IoT SENTINEL : Automated Device-Type Identification for Security Enforcement in IoT with Machine Learning☆44Updated 6 years ago
- IoT device type identification using machine learning techniques.☆38Updated 6 years ago
- A Behavior-Based Device Identification Method for the IoT☆56Updated 3 months ago
- Code for the paper "FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications" [NDSS '21]☆34Updated 4 years ago
- Development of a transfer learning system for the detection of cyber-attacks in 5G and IoT networks. Transfer learning will improve the a…☆13Updated 2 years ago
- This program allow you to extract some features from pcap files.☆38Updated 2 years ago
- ☆19Updated 3 years ago
- This is a dataset of 5G network traffic for use with machine learning tools to benchmark attack detection capabilities for multiple diffe…☆63Updated 7 months ago
- Classifying network traffic using machine learning approach☆22Updated 4 years ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆72Updated 3 years ago
- pcapML standardizes network traffic analysis datasets by directly encoding metadata information into raw traffic captures☆25Updated 2 years ago
- This repo contains implementation of IP2Vec model which is used for learning similarities between IP Addresses☆12Updated last year
- AI/ML and Cybersecurity: The Emperor has no Clothes☆17Updated last year
- Machine-learning-based intrusion detection☆37Updated 6 years ago
- ☆58Updated 2 years ago
- ☆15Updated last year
- Datasets for paper "Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic"☆15Updated 5 years ago
- ☆25Updated 11 months ago
- Deception and Moving Target Defense with Network Attack Simulation Paper Code☆13Updated 2 years ago
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆25Updated 5 years ago
- Smart-home network traffic ioT dataset☆18Updated 4 years ago
- Source code for the paper: Adaptive Clustering-based Malicious Traffic Classification at the Network Edge (https://homepages.inf.ed.ac.uk…☆34Updated 4 years ago
- Coburg Intrusion Detection Data Sets☆51Updated 7 years ago
- An anonymized mobile traffic dataset published by Chen's team (National University of Defense Technology)☆43Updated last year
- Developed a Moving Target Defense mechanism to prevent IP scanning from inside & outside the network. Controlled the packet flow in a SDN…☆28Updated 7 years ago